Cyber Security Insights For Executives

Business leaders and theit exective teams may see cyber security as the IT departments problem and a priority only when an intrusion occurs, but the cyber threat never stands still. It’s always evolving and criminal groups capitalise on new technologies to identify targets and launch attacks on an industrial scale. If your business has not experienced a cyber attack in the past year, you are in a shrinking minority. 
 
According to a survey carried out by  the Information Systems Security Association (ISSA) 58% of senior cyber security and business managers say that their organisation’s executive level  commitment to cyber security is “very good,” the remaining 42% say that their organisation’s executives’ dedication and buy-in to cyber security is “satisfactory, honest, or poor.” 
 
Cyber Security Topics Executives  Think Are Important  
 
Data privacy -   Data privacy topped the list at 35%, and this makes sense given regulations like GDPR and CCPA. In the past, data privacy was handled by legal teams, but with the onset and growth of regulations, CISOs have been asked to operationalise data privacy.  In other words, security teams are responsible for things like data discovery, the introduction of new data security controls, and coordination around technologies for data deletion.  GDPR also comes with the potential for hefty fines, so executives are paying close attention.  
 
Cyber attacks -  Can affect the interests of all stakeholders, disrupting a company’s operations, affecting how its employees work and inflicting brand damage that can severely jeopardise customer loyalty and trust. A breach can also impact sensitive information related to clients, contractors and suppliers. And as tighter regulations are put in place, companies may be exposed to legal liability, making cyber security a key corporate governance concern for investors.  
 
The threat of cyber attacks is so severe that the World Economic Forum in 2018 declared cyber security the top business risk in Europe, North America, and East Asia and the Pacific. 
 
Continuous cyber security training is lacking  - When asked if their current employer provides the cyber security team with the right level of training to keep up with business and IT risk, more than half (56%) of survey respondents answered “no,” suggesting that their organisations needed to provide more or significantly more training for the cyber security staff.
 
Internal relationships need work -  While many organisations consider the relationship between cyber security, business, and IT teams to be good, it seems that 20% of cyber security professionals say the relationship between cyber security and IT is fair or poor (surprising given that 78% of cyber security professionals got their start in IT) and 27% of survey respondents claim the relationship between cyber security and the business is fair or poor.  The biggest cyber security/IT relationship issue selected relates to prioritizing tasks between the two groups while the biggest cyber security/business relationship challenge is aligning goals.
 
Many businesses still believe they are below the criminals’ radar, however, the growth in cyber crime enabled by automatic vulnerability identification mean that every business is a target. 
 
It’s not the nature of a business that attracts the interest of cyber crime groups. It’s weak defences and the opportunity these present to mount a successful attack.  Your incident response plan should allow you to respond effectively to a range of scenarios, such as an internal breach, external attack, accidental data sharing and loss or theft of a physical device. 
 
Planning For Future Cyber Security Issues:  
 
  • Do you have an incident response plan in place? 
  • Who will lead the incident response team? 
  • What will happen in the first 24 hours after a breach? 
  • Have you allocated enough resources to ensure an effective response? 
  • What external partners will you use to manage elements such as forensic investigation, public relations, legal affairs and the notification process in the event of a data breach? 
Threats from outside the company are a huge concern for cybersecurity teams, but there are significant threats inside company firewalls. 
 
The very people who are closest to the data or other corporate assets can often be a weak link in a company’s cybersecurity program, particularly when they share passwords or files over unprotected networks, click on malicious hyperlinks sent from unknown email addresses, or otherwise act in ways that open up corporate networks to attack. Indeed, threats from inside the company account for about 43 percent of data breaches. 
 
Cyber security must be the concern of every single employee from the CEO down to the receptionist,  because implementing the best cyber security practice isn’t just about firewalls and encryption, it’s about changing the entire culture of your organisation. 
 
Creating a work environment which is vigilant and proactive is the only way to truly protect your business. Although there is no such thing as perfect protection, as a business leader, you have the responsibility to significantly reduce the risks.
 
ISSA:        Grant Thornton:     McKinsey:        Tech Centry:      Chief Executive:      CSO Online:       Image: Unsplash
 
You Might Also Read:
 
Five Things Management Must Know About Cyber Security:
 
 
« Hackers Fail To Contaminate Florida Water
Every Employee Should Be Considered A Target »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

vArmour

vArmour

vArmour is the industry’s first distributed security system that provides insight and control for multi-cloud environments.

sic[!]sec

sic[!]sec

sic[!]sec provide products and services for web application security.

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

Resilience Cyber insurance

Resilience Cyber insurance

Resilience helps to improve cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce great cyber hygiene.

e-Xpert Solutions

e-Xpert Solutions

e-Xpert Solutions is a company specialized in the Information Security field since 2001. Our skills are strong technical expertise and the development of tailor-made solutions.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Unified National Networks (UNN)

Unified National Networks (UNN)

UNN’s mission is to unify the national networks and create a modern and cost efficient digital platform connecting the entire country.

Netcraft

Netcraft

Netcraft is a global leader in cybercrime detection and disruption, combining cutting-edge technology with decades of experience to protect organizations of all sizes from digital threats and attacks.

Digital Twin Consortium (DTC)

Digital Twin Consortium (DTC)

Digital Twin Consortium is a global ecosystem of users who are driving best practices for digital twin usage and defining requirements for new digital twin standards.